Forensics On Video Conferencing Systems
|
|
|
- Angela Jocelin Norman
- 10 years ago
- Views:
Transcription
1 Forensics On Video Conferencing Systems University of Erlangen-Nuremberg January 28th, 2014
2 Agenda Part 1 Hacking VC Systems Attack surface Firmware analysis Device rooting Finding and exploiting bugs Part 2 Forensic Analysis Challenges Creating forensic copies Finding forensic evidence
3 Who am I? Moritz Jodeit Hamburg Principal Consultant at n.runs Application Security Reversing, bug hunting, writing exploits, Black Hat EU 2013 Talk Hacking Video Conferencing Systems
4 Motivation?
5 Hacking Videoconf Systems? yay! Neue NSA-Dokumente: US-Geheimdienst hörte Zentrale der Vereinten Nationen ab Demnach ist es der NSA im Sommer 2012 gelungen, in die interne Videokonferenzanlage der Völkergemeinschaft einzudringen und die Verschlüsselung zu knacken. Dies habe für "eine dramatische Verbesserung der Daten aus Video- Telekonferenzen und der Fähigkeit, diesen Datenverkehr zu entschlüsseln" gesorgt, heißt es in einem geheimen NSA-Dokument. "Der Datenverkehr liefert uns die internen Video-Telekonferenzen der Uno (yay!)". Innerhalb von knapp drei Wochen sei die Zahl der entschlüsselten Kommunikationen von 12 auf 458 angestiegen. In einem Fall habe die NSA zudem den chinesischen Geheimdienst dabei ertappt, ebenfalls zu spionieren. Daraufhin haben die NSA abgefangen, was zuvor die Chinesen abgehört hatten. Quelle:
6 Hacking Videoconf Systems? yay! Neue NSA-Dokumente: US-Geheimdienst hörte Zentrale der Vereinten Nationen ab Demnach ist es der NSA im Sommer 2012 gelungen, in die interne Videokonferenzanlage der Völkergemeinschaft einzudringen und die Verschlüsselung zu knacken. Dies habe für "eine dramatische Verbesserung der Daten aus Video-Telekonferenzen und der Fähigkeit, diesen Datenverkehr zu entschlüsseln" gesorgt, heißt es in einem geheimen NSA-Dokument. "Der Datenverkehr liefert uns die internen Video-Telekonferenzen der Uno (yay!)". Innerhalb von knapp drei Wochen sei die Zahl der entschlüsselten Kommunikationen von 12 auf 458 angestiegen. In einem Fall habe die NSA zudem den chinesischen Geheimdienst dabei ertappt, ebenfalls zu spionieren. Daraufhin haben die NSA abgefangen, was zuvor die Chinesen abgehört hatten. Quelle:
7 Hacking Videoconf Systems? yay! Neue NSA-Dokumente: US-Geheimdienst hörte Zentrale der Vereinten Nationen ab Demnach ist es der NSA im Sommer 2012 gelungen, in die interne Videokonferenzanlage der Völkergemeinschaft einzudringen und die Verschlüsselung zu knacken. Dies habe für "eine dramatische Verbesserung der Daten aus Video- Telekonferenzen und der Fähigkeit, diesen Datenverkehr zu entschlüsseln" gesorgt, heißt es in einem geheimen NSA-Dokument. "Der Datenverkehr liefert uns die internen Video-Telekonferenzen der Uno (yay!)". Innerhalb von knapp drei Wochen sei die Zahl der entschlüsselten Kommunikationen von 12 auf 458 angestiegen. In einem Fall habe die NSA zudem den chinesischen Geheimdienst dabei ertappt, ebenfalls zu spionieren. Daraufhin haben die NSA abgefangen, was zuvor die Chinesen abgehört hatten. Quelle:
8 Hacking Videoconf Systems? yay! Neue NSA-Dokumente: US-Geheimdienst hörte Zentrale der Vereinten Nationen ab Demnach ist es der NSA im Sommer 2012 gelungen, in die interne Videokonferenzanlage der Völkergemeinschaft einzudringen und die Verschlüsselung zu knacken. Dies habe für "eine dramatische Verbesserung der Daten aus Video- Telekonferenzen und der Fähigkeit, diesen Datenverkehr zu entschlüsseln" gesorgt, heißt es in einem geheimen NSA-Dokument. "Der Datenverkehr liefert uns die internen Video-Telekonferenzen der Uno (yay!)". Innerhalb von knapp drei Wochen sei die Zahl der entschlüsselten Kommunikationen von 12 auf 458 angestiegen. In einem Fall habe die NSA zudem den chinesischen Geheimdienst dabei ertappt, ebenfalls zu spionieren. Daraufhin haben die NSA abgefangen, was zuvor die Chinesen abgehört hatten. Quelle:
9 How it all started Compromising secured VC systems? Basic assumptions Current Firmware Hardened system configuration No administrative interfaces Only H.323 or SIP ports reachable Alternative: Only access via PSTN
10 Revenue Market Share Top Five Enterprise Videoconferencing and Telepresence Vendors Cisco (50.6%) Polycom (26.3%) Others (13.1%) Lifesize (5%) Teliris (2.6%) Vidyo (2.5%) Published by IDC for Q1 2012
11 Polycom One of the leading vendors Different telepresence solutions Most popular units cost up to $25,000 Polycom customers Government agencies / ministries worldwide World s 10 largest banks 6 largest insurance companies
12 Polycom HDX Systems Popular video conferencing solution Different configs (HDX ) HDX 7000 HD (our lab equipment) EagleEye HD camera Mica Microphone array Remote control Connected to ext. display
13 Attack Surface
14 Attack Surface
15 Attack Surface Polycom HDX Web Interface Provisioning Service API Interface (serial console, TCP port 24) Polycom Command Shell (TCP port 23) SNMP Video conferencing protocols H.323 and SIP
16 Attack Surface Polycom HDX Web Interface Provisioning Service API Interface (serial console, TCP port 24) Polycom Command Shell (TCP port 23) SNMP Video conferencing protocols H.323 and SIP
17 Firmware Analysis Software updates (support.polycom.com) ZIP archives contain single PUP file Manual installation or via provisioning Analysis based on version 3.0.5
18 PUP File Structure
19 PUP File Structure PUP file header Bootstrap archive Bootstrap code to install update Main functionality in setup.sh script Update package
20 PUP Header Figuring out the PUP header file format Found puputils.ppc in extracted firmware Polycom Update Utilities Used to verify and install updates Can be run inside Qemu (Debian on PPC)
21 PUP Header Every PUP file starts with fixed PUP file ID PPUP or PPDP Several fixed-size fields Padded with null bytes
22 Length (bytes) Description PUP Header 5 PUP File ID 4 Header Version 20 Header MAC Signature 32 Processor Type 32 Project Code Name 16 Software Version 16 Type of Software 32 Hardware Model 16 Build Number 32 Build Date 16 Build By 16 File Size (without header) 5 Compression algorithm 445 Supported Hardware 81 Signature (ASN.1 encoded)
23 Length (bytes) Description PUP Header 5 PUP File ID 4 Header Version 20 Header MAC Signature 32 Processor Type 32 Project Code Name 16 Software Version 16 Type of Software 32 Hardware Model 16 Build Number 32 Build Date 16 Build By 16 File Size (without header) 5 Compression algorithm 445 Supported Hardware 81 Signature (ASN.1 encoded)
24 Header HMAC Header HMAC value stored in PUP header Verification process 1. Set Header HMAC field to zero 2. Calculate HMAC over PUP header 3. Compare result with stored value 4. Abort update if result doesn t match
25 Header HMAC
26 Header HMAC Secret is required for verification Must be stored on the device Can be extracted :) Hardcoded in puputils.ppc binary
27 Header HMAC Secret is required for verification Must be stored on the device Can be extracted :) Hardcoded in puputils.ppc binary
28 Header HMAC Secret allows to calculate valid HMAC No reversing of HMAC algorithm required Correct HMAC is part of the error message!
29 Public Key DSA Signature 2nd protection to prevent file tampering Used in addition to the header HMAC Verifies integrity of the whole file Including the PUP header Signature is stored in PUP header ASN.1 encoded form No further analysis conducted
30 Device Rooting
31 Device Rooting No system level access to the device Reasons for getting root access Simplifies bug hunting More device control for fuzzing Process monitoring Restarting processes Makes exploit development a lot easier
32 Device Rooting Can be achieved in different ways Exploiting command injection Direct modification of CF card Undocumented Developer Boot Mode
33 HDX Boot Modes Production vs. Development boot mode Development mode enables telnet server Allows root login without password For details see my BH 2013 whitepaper
34 Device Rooting
35 System Architecture MPC8349EMITX SoC Freescale e300c1 PowerPC processor Linux-based system Kernel U-Boot boot loader Comes with standard binaries busybox, wget, gdbserver,
36 Main Processes AppMain Java Process GUI Web interface functionality User authentication + crypto functionality Polycom AVC H.323 SIP
37 Polycom AVC Implemented in /opt/polycom/bin/avc Huge non-stripped binary (~ 50 MB) Implemented in C Running as root E.g. implementation of H.323 and SIP and many other complicated protocols What could possibly go wrong? :)
38 Polycom AVC The place to look for bugs in VC protocols > 800 xrefs to strcpy() > 1400 xrefs to sprintf() No exploit mitigations at all Easy to reverse engineer due to symbols
39 Vulndev Environment Create debugging environment on device Eases bug hunting Simplifies exploit development process GDB remote debugging System already ships with a gdbserver binary Disabling Polycom watchdog daemon Create the watchdog_disable.dat config file
40 Bug Hunting We focused on the H.323 protocol Old and complex protocol Still in use at many locations nowadays Many different H.323 signaling protocols We looked at the H Q.931 protocol
41 H Q.931 Consists of binary encoded messages Messages consist of Information Elements (IE s) Encoded in ASN.1 Several different IE s are defined IE s provide information to remote site Callers identity, capabilities,
42 H Q.931
43 Call Initiation Client connects to TCP port 1720 Sends SETUP packet Indicates clients desire to start a call SETUP packet is parsed even if call fails E.g. call is not accepted by remote site Full call establishment requires more msgs But not relevant for this discussion
44 Call Detail Records HDX systems store call detail records (CDRs) Also written for failed calls Every SETUP packet generates a CDR entry CDR table stored in SQLite database Written records include Call start/end time Call direction Remote system name Extracted from Display IE
45 Format String Vulnerability SQL query string for writing CDR entry Passed as format str to the vsnprintf() function We control the embedded Display IE Bug triggered with single SETUP packet
46 Exploit Strategy 1. Turn bug into write4 primitive Write 4 arbitrary bytes at arbitrary address Single SETUP packet writes 4 bytes 2. Use write4 primitive to store shellcode 3. Use write4 to overwrite function ptr And let the code jump into stored shellcode 4. PROFIT!
47 Format String Stack Layout
48 Shellcode Simple PowerPC system() shellcode Provides a back-connect shell Executes our HDX payload HDX payload Controls the device s peripherals PTZ camera, microphone, display, etc. Based on Polycom s internal IPC mechanism (XCOM) For further details see my BH 2013 whitepaper
49 Function Pointer Constraints The function ptr has a few requirements We need to be able to trigger it remotely Restrictions on the format string Bytes in fmt str must be 0x00 < b < 0x80 Otherwise logging code is not hit Same restriction applies to address of function ptr
50 Finding Function Pointers Highlighted potential addresses in IDA Checked xrefs for use of PowerPC mtctr / bctrl instructions
51 Function Pointer Overwrite Timer thread running in VideoBitsStreamPoleTimerProc() Jumps to [CodecPoleList]+0x1494
52 Remote Root Exploit
53 Forensic Analyis
54 Forensic Analysis Challenges Requires deep understanding of system Documentation not publicly available Requires extensive research up front Every vendor uses their custom firmware But even for the same vendor Different firmware versions Different hardware releases
55 First Steps Disconnect the power supply! HDX systems log a lot of information Use of a pretty small ring buffer Evidence gets overwritten quickly Do not do a normal shutdow A lot information gets logged in that case!
56 Creating a Forensic Copy We can t work on the system directly Forensic copy of the internal memory Further analysis only conducted on image
57 Extracting Memory Cards HDX systems use CompactFlash cards Various HDX versions have different cases Different ways to get to the CF card HDX 8000 vs. HDX 9000 Extracting the CF card can be a bit tricky in some cases
58 Opening HDX Systems DISCLAIMER Having the right hardware tools might make the job easier :)
59 Polycom HDX 8000 One of the smaller HDX systems Can be opened quite easily If you know how to do it ;) Three screws need to be removed Side of the case can be slided to the front
60 Polycom HDX 8000
61 Polycom HDX 9000 One of the bigger HDX systems Case can be opened quite easily Getting access to the CF card is another story Just remove all screws on back and sides
62 Polycom HDX 9000
63 Polycom HDX 9000 CF card is hidden beneath several PCBs
64 Polycom HDX 9000 Accessing the CF card is tricky Removing all PCBs Would require a complete dismount Could easily damage something :( We didn t have the right tools We needed to improvise :P
65 Removing Internal Modem
66 Removing Internal Modem
67 Removing Internal Modem
68 Removing Power Connectors
69 Removing CF Card Screw Touching the screw holding the CF card with a single finger is now possible
70 Removing CF Card Screw Place one hand under covering PCB Touching screw with single finger is now possible But screw must be loosened first
71 Used Tools ;)
72 Removing CF Card Screw Extended nipper used to loosen screw Nipper can t be rotated enough Used magnetic stick to turn the screw This was really fiddly and required nerves! Probably lost some hair during this operation
73 Removing CF Card Screw
74 Removing CF Card Screw
75 Removing CF Card
76 Removing CF Card
77 File System Analysis
78 File System Analysis Analysis on created CF card image HDX systems have four partitions Partition Description Type Mounted /dev/hda1 Boot related files, Linux kernel image ext2 ro /dev/hda2 Root file system ext2 ro /dev/hda3 Log and configuration files ext3 rw /dev/hda4 Factory restore file system ext2 --
79 Log Files Stored in /var/log on /dev/hda3 Pretty extensive logging by default Good for the forensic analysis Bad, because logs get overwritten quickly
80 Things to look for Failed or successful login attempts Initiated video calls Typical Linux-based forensics stuff Crashed daemons reboots, etc.
81 Configuration Files Stored in /dat directory on /dev/hda3 Every setting stored in single.dat file Text-based files One or more lines of text
82 Interesting Config Files Version of current firmware Stored in systemsoftwareversion.dat Known vulnerabilities in old versions Hashes of previously set passwords historymeetingpassword.dat historyremotepassword.dat historyroomsw.dat
83 Password Hashes Stored to prevent password re-use Passwords stored as SHA1 hashes Unsalted of course :) Cracking the SHA1 hashes Identifies potentially weak passwords Might give you password set by an attacker Timestamps indicate time of PW change
84 Last Adminstrator Login Last admin login is recorded lastloginfromadmin.dat lastloginsuccessdatetimeadmin.dat Can be correlated with timestamps
85 Call Detail Records Stored as a SQLite database /data/polycom/cdr/new/localcdr.db Included information Start and end date/time Call duration Called number Call direction Used protocols, etc.
86 Polycom Command Shell Was affected by remote vulns in the past Check if PSH was enabled telnet_enabled.dat
87 Root File System Always mounted read-only Only mounted read-write for updates Check last-modified timestamps Match all files against original image
88 Use of Public Exploits Access times might identify use of specific public exploits Metasploit PSH Telnet Auth Bypass Module psh_auth_bypass.rb Exploits auth bypass + command injection Uses OpenSSL reverse connect payload
89 Use of Public Exploits cmd/unix/reverse_openssl Uses busybox and openssl binaries Binaries not regularly called in production
90 Factory Restore Filesystem Contains an old firmware version Current version at the time of shipping? Never modified or mounted in prod! Attackers might use it for persistency Match all files against (old) original image Unusual timestamps should make you suspicious
91 Conclusion Forensics on VC systems requires internal system knowledge Knowing how to break them helps No advanced attacks observed yet But they happen! (see NSA hack) Having the right hardware tools helps :P
92 Questions?
93 Thank You! Moritz Jodeit n.runs professionals GmbH Principal Security Consultant Nassauer Straße 60 D Oberursel mobile: phone: fax: it. consulting. infrastructure. security. business
Moritz Jodeit [email protected] Twitter: @moritzj
Moritz Jodeit [email protected] Twitter: @moritzj Agenda Attack Surface Firmware Analysis Device Rooting System Architecture Vulndev Environment Remote H.323 Exploit Post Exploitation Who am I? From
SEAGATE BUSINESS NAS ACCESSING THE SHELL. February 1, 2014 by Jeroen Diel IT Nerdbox
SEAGATE BUSINESS NAS ACCESSING THE SHELL February 1, 2014 by Jeroen Diel IT Nerdbox P a g e 1 Table of Contents Introduction... 2 Technical specifications... 3 Gaining access to the shell... 4 Enable the
Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5
Polycom HDX Systems, Version 3.0.5 A warning about operating in a maximum security environment The maximum security profile is designed to lock down communications to the most stringent requirements of
ERNW Newsletter 51 / September 2015
ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING
From SQL Injection to MIPS Overflows
From SQL Injection to MIPS Overflows Rooting SOHO Routers Zachary Cutlip Black Hat USA 2012 Acknowledgements Tactical Network Solutions Craig Heffner What I m going to talk about Novel uses of SQL injection
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - [email protected] Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Installing Software and Options for Polycom HDX Systems and Accessories
Installing Software and Options for Polycom HDX Systems and Accessories By upgrading your Polycom software or by purchasing additional system options, your organization continues to benefit from the latest
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
Installing Software and Options for Polycom HDX Systems and Accessories. Overview. Polycom HDX System and Options. Polycom Touch Control
Installing Software and Options for Polycom HDX Systems and Accessories By upgrading your Polycom software or by purchasing additional system options, your organization continues to benefit from the latest
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance
Virtually Secure a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance Who am I? Tal Zeltzer Independent security researcher from Israel Reverse engineering (mostly embedded
Linux Embedded devices with PicoDebian Martin Noha 28.9.2006
Embedded systems Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 24.03.2005 1 Agenda Why did I look in this stuff? What is an embedded device? Characteristic hardware global requirements for
PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling
Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
EXPLOITING SURVEILLANCE CAMERAS
EXPLOITING SURVEILLANCE CAMERAS Like a Ho!ywood Hacker Craig Heffner Tactical Network Solutions 25 February 2013 Exploiting Survei!ance Cameras Like a Ho!ywood Hacker" 1 EXPLOITING SURVEILLANCE CAMERAS
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
KINDLE FORENSICS: ACQUISITION & ANALYSIS
KINDLE FORENSICS: ACQUISITION & ANALYSIS Peter Hannay SECAU School of Computer and Security Science Edith Cowan University Perth, Australia [email protected] Abstract The Amazon Kindle ebook reader supports
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
FIPS 140-2 SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes
Software Version 7.1.2.7
Technical Information Software Version 7.1.2.7 DDF4220HDV Picodome MDF4220HD DDF4320HD-DN DDF4520HDV-DN English Version 1.0 / 2014-03-20 1 Abstract This document contains information on new features and
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
A Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
Supply Chain (In-) Security
Supply Chain (In-) Security Graeme Neilson & Enno Rey Contact us: [email protected], [email protected] Graeme & Enno Graeme Neilson Security Consultant & Researcher Networking, Reverse engineering,
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Absolute Backdoor Revisited. Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs
Absolute Backdoor Revisited Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs BlackHat, Las Vegas August, 2014 What is Computrace? Computrace is an Anti-Theft software
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD.
V100R011 Issue 02 Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Implementation and Implications of a Stealth Hard-Drive Backdoor
March 3rd 2014 OSSIR/JSSI 2014 Paper first presented at ACSAC 2013 Awarded Best Student Paper Award Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach Davide Balzarotti Aure
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
noway.toonux.com 09 January 2014
noway.toonux.com p3.7 10 noway.toonux.com 88.190.52.71 Debian Linux 0 CRITICAL 0 HIGH 5 MEDIUM 2 LOW Running Services Service Service Name Risk General Linux Kernel Medium 22/TCP OpenSSH 5.5p1 Debian 6+squeeze4
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
PIKA µfirewall Cloud Management Guide
Version 1.0 April 2015 Introduction... 2 Installation... 2 Configuring the Unit... 10 Changing Parameters... 10 Adding Blacklists and White lists... 12 Upgrading Firmware... 15 Disclaimer... 18 Frequently
Exploiting Trustzone on Android
1 Introduction Exploiting Trustzone on Android Di Shen(@returnsme) [email protected] This paper tells a real story about exploiting TrustZone step by step. I target an implementation of Trusted Execution
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Staying Persistent in Software Defined Networks
Staying Persistent in Software Defined Networks Hellfire Security Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois [email protected] Overview White Box Ethernet Stupid Is As Stupid
COLLABORATE ROOM PRO 510/520/610/620 RELEASE VERSION 1.0.2 (167.0.94.0) - W7PQ20/PQ21/PQ22 September 2015 Introduction
RELEASE NOTES COLLABORATE Room Pro Media Appliance COLLABORATE ROOM PRO 510/520/610/620 RELEASE VERSION 1.0.2 (167.0.94.0) - W7PQ20/PQ21/PQ22 September 2015 This release includes improvements and fixes
Cisco TelePresence VCR MSE 8220
Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
VTO6xxx. IP door stations. User manual
VTO6xxx IP door stations User manual Table of Contents 1 Product Appearance 2 Basic Function Introduction 2.1 Call Manager Center 2.2 Call User 2.2.1 Connecting Status 2.2.2 Calling Status 2.3 Monitor
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...
Polycom HDX Systems Deployment Guide for Maximum Security Environments
[Type the document title] Military Unique Deployment Guide 2.7.3.1_J February 2014 3725-12748-007/A Polycom HDX Systems Deployment Guide for Maximum Security Environments Polycom Document Title 1 Trademark
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
HOW I MET YOUR MODEM EXPLOIT & TROJAN DEV FOR CONSUMER DSL DEVICES HACK IN THE BOX 2013 AMSTERDAM - PETER GEISSLER & STEVEN KETELAAR
HOW I MET YOUR MODEM EXPLOIT & TROJAN DEV FOR CONSUMER DSL DEVICES HACK IN THE BOX 2013 AMSTERDAM - PETER GEISSLER & STEVEN KETELAAR WHO ARE WE? STEVEN Software developer Security fanatic Produces dance
NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3
NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865 NOVEMBER 25, 2013 SNMP SECURITY 2 ABSTRACT As a Network Monitoring System Administrator I have gained a substantial amount
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
How To Use Powerhell For Security Research
PowerShell David Kennedy (ReL1K) Josh Kelley (Winfang) http://www.secmaniac.com Twitter: dave_rel1k winfang98 About Josh Security Analyst with a Fortune 1000 --- Works with Dave Heavy experience in penetration
Auto-Answer Configuration for Polycom HDX Systems
Auto-Answer Configuration for Polycom HDX Systems Like most modern videoconferencing devices, Polycom HDX models have the ability to automatically accept incoming video calls from other video endpoints.
Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels
Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels What Goes Around Comes Back Around! Aditya K Sood Senior Security Researcher and Engineer 1 Dr. Aditya K Sood About the Speaker! Senior
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
System Management. Leif Nixon. a security perspective 1/37
1/37 System Management a security perspective Leif Nixon 2/37 System updates Should we ever update the system? Some common update strategies: 1. If it works, don t touch it! 2. We pick and choose the most
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
The embedded Linux quick start guide lab notes
The embedded Linux quick start guide lab notes Embedded Linux Conference Europe 2010 Date: Tuesday 26th October Location: DeVere University of Arms Hotel, Cambridge Room: Churchill Suite Presenter: Chris
Embedded Linux Platform Developer
Embedded Linux Platform Developer Course description Advanced training program on Embedded Linux platform development with comprehensive coverage on target board bring up, Embedded Linux porting, Linux
The BackTrack Successor
SCENARIOS Kali Linux The BackTrack Successor On March 13, Kali, a complete rebuild of BackTrack Linux, has been released. It has been constructed on Debian and is FHS (Filesystem Hierarchy Standard) complaint.
Administering the Network Analysis Module. Cisco IOS Software. Logging In to the NAM with Cisco IOS Software CHAPTER
CHAPTER 4 How you administer the NAM on your Catalyst 6500 series switch or Cisco 7600 series router depends on whether you are using the Cisco IOS software or the Catalyst operating system software. Several
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
Installing Software and Options for the Polycom RealPresence Group Series and Accessories
for the Polycom RealPresence Group Series and Accessories Overview By upgrading your Polycom software or by purchasing additional system options, your organization continues to benefit from the latest
Barracuda Syslog Barracuda Web Site Firewall
Overview There are four types of logs generated by the which can be configured to be sent over the syslog mechanism to a remote server specified by the Barracuda Web Site Firewall administrator. These
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Open Network Install Environment
Open Network Install Environment Curt Brune Member of Technical Staff January 2014 Agenda Overview What Is ONIE? Lessons Learned ONIE Development Demo Project Directions cumulusnetworks.com 2 What Is ONIE?
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Polycom Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications October 2015 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
